e2e face recognition
diff --git a/argo/install.yaml b/argo/install.yaml
new file mode 100644
index 0000000..c800f6a
--- /dev/null
+++ b/argo/install.yaml
@@ -0,0 +1,408 @@
+# This is an auto-generated file. DO NOT EDIT
+apiVersion: apiextensions.k8s.io/v1beta1
+kind: CustomResourceDefinition
+metadata:
+ name: cronworkflows.argoproj.io
+spec:
+ group: argoproj.io
+ names:
+ kind: CronWorkflow
+ plural: cronworkflows
+ shortNames:
+ - cronwf
+ - cwf
+ scope: Namespaced
+ version: v1alpha1
+---
+apiVersion: apiextensions.k8s.io/v1beta1
+kind: CustomResourceDefinition
+metadata:
+ name: workflows.argoproj.io
+spec:
+ additionalPrinterColumns:
+ - JSONPath: .status.phase
+ description: Status of the workflow
+ name: Status
+ type: string
+ - JSONPath: .status.startedAt
+ description: When the workflow was started
+ format: date-time
+ name: Age
+ type: date
+ group: argoproj.io
+ names:
+ kind: Workflow
+ plural: workflows
+ shortNames:
+ - wf
+ scope: Namespaced
+ version: v1alpha1
+---
+apiVersion: apiextensions.k8s.io/v1beta1
+kind: CustomResourceDefinition
+metadata:
+ name: workflowtemplates.argoproj.io
+spec:
+ group: argoproj.io
+ names:
+ kind: WorkflowTemplate
+ plural: workflowtemplates
+ shortNames:
+ - wftmpl
+ scope: Namespaced
+ version: v1alpha1
+# ---
+# apiVersion: v1
+# kind: ServiceAccount
+# metadata:
+# name: argo
+# ---
+# apiVersion: v1
+# kind: ServiceAccount
+# metadata:
+# name: argo-server
+---
+apiVersion: rbac.authorization.k8s.io/v1
+kind: Role
+metadata:
+ name: argo-role
+rules:
+- apiGroups:
+ - ""
+ resources:
+ - secrets
+ verbs:
+ - get
+---
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRole
+metadata:
+ labels:
+ rbac.authorization.k8s.io/aggregate-to-admin: "true"
+ name: argo-aggregate-to-admin
+rules:
+- apiGroups:
+ - argoproj.io
+ resources:
+ - workflows
+ - workflows/finalizers
+ - workflowtemplates
+ - workflowtemplates/finalizers
+ - cronworkflows
+ - cronworkflows/finalizers
+ verbs:
+ - create
+ - delete
+ - deletecollection
+ - get
+ - list
+ - patch
+ - update
+ - watch
+---
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRole
+metadata:
+ labels:
+ rbac.authorization.k8s.io/aggregate-to-edit: "true"
+ name: argo-aggregate-to-edit
+rules:
+- apiGroups:
+ - argoproj.io
+ resources:
+ - workflows
+ - workflows/finalizers
+ - workflowtemplates
+ - workflowtemplates/finalizers
+ - cronworkflows
+ - cronworkflows/finalizers
+ verbs:
+ - create
+ - delete
+ - deletecollection
+ - get
+ - list
+ - patch
+ - update
+ - watch
+---
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRole
+metadata:
+ labels:
+ rbac.authorization.k8s.io/aggregate-to-view: "true"
+ name: argo-aggregate-to-view
+rules:
+- apiGroups:
+ - argoproj.io
+ resources:
+ - workflows
+ - workflows/finalizers
+ - workflowtemplates
+ - workflowtemplates/finalizers
+ - cronworkflows
+ - cronworkflows/finalizers
+ verbs:
+ - get
+ - list
+ - watch
+---
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRole
+metadata:
+ name: argo-cluster-role
+rules:
+- apiGroups:
+ - ""
+ resources:
+ - pods
+ - pods/exec
+ verbs:
+ - create
+ - get
+ - list
+ - watch
+ - update
+ - patch
+ - delete
+- apiGroups:
+ - ""
+ resources:
+ - configmaps
+ verbs:
+ - get
+ - watch
+ - list
+- apiGroups:
+ - ""
+ resources:
+ - persistentvolumeclaims
+ verbs:
+ - create
+ - delete
+- apiGroups:
+ - argoproj.io
+ resources:
+ - workflows
+ - workflows/finalizers
+ verbs:
+ - get
+ - list
+ - watch
+ - update
+ - patch
+ - delete
+ - create
+- apiGroups:
+ - argoproj.io
+ resources:
+ - workflowtemplates
+ - workflowtemplates/finalizers
+ verbs:
+ - get
+ - list
+ - watch
+- apiGroups:
+ - ""
+ resources:
+ - serviceaccounts
+ verbs:
+ - get
+ - list
+- apiGroups:
+ - argoproj.io
+ resources:
+ - cronworkflows
+ - cronworkflows/finalizers
+ verbs:
+ - get
+ - list
+ - watch
+ - update
+ - patch
+ - delete
+- apiGroups:
+ - ""
+ resources:
+ - events
+ verbs:
+ - create
+- apiGroups:
+ - policy
+ resources:
+ - poddisruptionbudgets
+ verbs:
+ - create
+ - get
+ - delete
+---
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRole
+metadata:
+ name: argo-server-cluster-role
+rules:
+- apiGroups:
+ - ""
+ resources:
+ - configmaps
+ verbs:
+ - get
+ - watch
+ - list
+- apiGroups:
+ - ""
+ resources:
+ - secrets
+ verbs:
+ - get
+- apiGroups:
+ - ""
+ resources:
+ - pods
+ - pods/exec
+ - pods/log
+ verbs:
+ - get
+ - list
+ - watch
+ - delete
+- apiGroups:
+ - ""
+ resources:
+ - secrets
+ verbs:
+ - get
+- apiGroups:
+ - argoproj.io
+ resources:
+ - workflows
+ - workflowtemplates
+ - cronworkflows
+ verbs:
+ - create
+ - get
+ - list
+ - watch
+ - update
+ - patch
+ - delete
+---
+apiVersion: rbac.authorization.k8s.io/v1
+kind: RoleBinding
+metadata:
+ name: argo-binding
+roleRef:
+ apiGroup: rbac.authorization.k8s.io
+ kind: Role
+ name: argo-role
+subjects:
+- kind: ServiceAccount
+ name: default
+---
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRoleBinding
+metadata:
+ name: argo-binding
+roleRef:
+ apiGroup: rbac.authorization.k8s.io
+ kind: ClusterRole
+ name: argo-cluster-role
+subjects:
+- kind: ServiceAccount
+ name: default
+ namespace: pcloud
+---
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRoleBinding
+metadata:
+ name: argo-server-binding
+roleRef:
+ apiGroup: rbac.authorization.k8s.io
+ kind: ClusterRole
+ name: argo-server-cluster-role
+subjects:
+- kind: ServiceAccount
+ name: default
+ namespace: pcloud
+---
+apiVersion: v1
+kind: ConfigMap
+metadata:
+ name: workflow-controller-configmap
+---
+apiVersion: v1
+kind: Service
+metadata:
+ name: argo-server
+spec:
+ ports:
+ - port: 2746
+ targetPort: 2746
+ selector:
+ app: argo-server
+---
+apiVersion: v1
+kind: Service
+metadata:
+ name: workflow-controller-metrics
+spec:
+ ports:
+ - port: 9090
+ protocol: TCP
+ targetPort: 9090
+ selector:
+ app: workflow-controller
+---
+apiVersion: apps/v1
+kind: Deployment
+metadata:
+ name: argo-server
+spec:
+ selector:
+ matchLabels:
+ app: argo-server
+ template:
+ metadata:
+ labels:
+ app: argo-server
+ spec:
+ containers:
+ - args:
+ - server
+ image: argoproj/argocli:v2.7.4
+ name: argo-server
+ ports:
+ - containerPort: 2746
+ readinessProbe:
+ httpGet:
+ path: /
+ port: 2746
+ scheme: HTTP
+ initialDelaySeconds: 10
+ periodSeconds: 20
+ serviceAccountName: default
+---
+apiVersion: apps/v1
+kind: Deployment
+metadata:
+ name: workflow-controller
+spec:
+ selector:
+ matchLabels:
+ app: workflow-controller
+ template:
+ metadata:
+ labels:
+ app: workflow-controller
+ spec:
+ containers:
+ - args:
+ - --configmap
+ - workflow-controller-configmap
+ - --executor-image
+ - argoproj/argoexec:v2.7.4
+ command:
+ - workflow-controller
+ image: argoproj/workflow-controller:v2.7.4
+ name: workflow-controller
+ serviceAccountName: default
\ No newline at end of file
diff --git a/argo/setup.sh b/argo/setup.sh
index 493e866..7d6cc53 100644
--- a/argo/setup.sh
+++ b/argo/setup.sh
@@ -1,5 +1,8 @@
#!/bin/sh
+# kubectl create namespace argo
+kubectl apply -n pcloud -f install.yaml
+
# kubectl apply -n kube-system -f mio-minio-secrets.yaml
@@ -9,10 +12,10 @@
# kubectl -n kube-system port-forward deployment/my-argo-server 2746 &
# read -s
-kubectl apply -n kube-system -f argo-events-crds-install.yaml
-read -s
+#kubectl apply -n kube-system -f argo-events-crds-install.yaml
+#read -s
-kubectl apply -n kube-system -f event-source.yaml
-kubectl apply -n kube-system -f gateway.yaml
-kubectl apply -n kube-system -f sensor.yaml
+#kubectl apply -n kube-system -f event-source.yaml
+#kubectl apply -n kube-system -f gateway.yaml
+#kubectl apply -n kube-system -f sensor.yaml